Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 531688 (CVE-2014-9029) - <media-libs/jasper-1.900.1-r7: input sanitization errors (CVE-2014-9029)
Summary: <media-libs/jasper-1.900.1-r7: input sanitization errors (CVE-2014-9029)
Status: RESOLVED FIXED
Alias: CVE-2014-9029
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B2 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-12-04 15:34 UTC by Agostino Sarubbo
Modified: 2015-03-06 15:29 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-12-04 15:34:20 UTC
From ${URL} :

#2014-009 JasPer input sanitization errors

Description:

The JasPer project is an open source implementation for the JPEG-2000 codec.

The library is affected by two heap-based buffer overflows which can lead to
arbitrary code execution. The vulnerability is present in functions
jpc_dec_cp_setfromcox() and jpc_dec_cp_setfromrgn().

A specially crafted jp2 file, can be used to trigger the overflows.

Affected version:

JasPer <= 1.900.1

Fixed version:

JasPer, N/A

Credit: vulnerability report received from the Google Security Team.

CVE: CVE-2014-9029

Timeline:

2014-11-19: vulnerability report received
2014-11-20: contacted affected vendors
2014-11-21: assigned CVE
2014-11-27: patch contributed by Tomas Hoger from Red Hat Product Security
2014-12-04: advisory release

References:
http://www.ece.uvic.ca/~frodo/jasper
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-9029

Permalink:
http://www.ocert.org/advisories/ocert-2014-009.html


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Justin Lecher (RETIRED) gentoo-dev 2014-12-05 08:05:40 UTC
+*jasper-1.900.1-r7 (05 Dec 2014)
+
+  05 Dec 2014; Justin Lecher <jlec@gentoo.org> +jasper-1.900.1-r7.ebuild,
+  +files/jasper-1.701.0-GL.patch, +files/jasper-1.701.0-GL-ac.patch,
+  +files/jasper-CVE-2014-9029.patch, +files/jasper-pkgconfig.patch:
+  Import security fix from fedora for CVE-2014-9029, #531688
+
Comment 2 Justin Lecher (RETIRED) gentoo-dev 2014-12-05 08:06:33 UTC
@arches, please stable.
Comment 3 Jeroen Roovers (RETIRED) gentoo-dev 2014-12-05 15:25:08 UTC
Stable for HPPA.
Comment 4 Jeroen Roovers (RETIRED) gentoo-dev 2014-12-05 15:25:48 UTC
Oh, you forgot (again):

Arch teams, please test and mark stable:
=media-libs/jasper-1.900.1-r7
Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
Comment 5 Agostino Sarubbo gentoo-dev 2014-12-06 17:02:31 UTC
amd64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2014-12-06 17:03:00 UTC
x86 stable
Comment 7 Agostino Sarubbo gentoo-dev 2014-12-07 12:09:15 UTC
ppc stable
Comment 8 Agostino Sarubbo gentoo-dev 2014-12-12 09:39:48 UTC
ia64 stable
Comment 9 Agostino Sarubbo gentoo-dev 2014-12-23 09:30:56 UTC
alpha stable
Comment 10 Markus Meier gentoo-dev 2014-12-23 12:37:11 UTC
arm stable
Comment 11 Agostino Sarubbo gentoo-dev 2014-12-24 14:49:00 UTC
ppc64 stable
Comment 12 Agostino Sarubbo gentoo-dev 2014-12-26 09:19:59 UTC
sparc stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 13 Justin Lecher (RETIRED) gentoo-dev 2014-12-26 10:39:38 UTC
+  26 Dec 2014; Justin Lecher <jlec@gentoo.org> -jasper-1.900.1-r6.ebuild:
+  Drop vulnerable version
+

Tree is clean now.
Comment 14 GLSAMaker/CVETool Bot gentoo-dev 2015-01-04 18:28:46 UTC
CVE-2014-9029 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9029):
  Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2)
  jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and
  earlier allow remote attackers to execute arbitrary code via a crafted jp2
  file, which triggers a heap-based buffer overflow.
Comment 15 GLSAMaker/CVETool Bot gentoo-dev 2015-03-06 15:29:13 UTC
This issue was resolved and addressed in
 GLSA 201503-01 at http://security.gentoo.org/glsa/glsa-201503-01.xml
by GLSA coordinator Mikle Kolyada (Zlogene).